logo

JobNob

Your Career. Our Passion.

Information Security Consultant


Multicloud4U® Technologies


Location

Gurgaon | India


Job description

Job Profile: IT Security Leader LATAM DEPARTMENT: Information Technology Experience:

3 years and above Location: Gurugram, Haryana Job Type: Full- time/ Permanent Key Selection Area: Education: Essential: ·

A bachelor's degree in information systems or equivalent work experience; an M.B.A. or M.S. in information security is preferred. Work Experience: Essential: ·

A minimum of seven years of IT experience, with five years in an information security role and at least two years in a supervisory capacity. Desirable: ·

Experience in consulting. ·

International multi-industry experience Skills: Essential: ·

Problem solving, finding root cause of issues, analytical. ·

Excellent management and organizational skills, ·

Solid experience in managing business critical IT operations. ·

Strong customer focus and genuine desire to assist. ·

Ability to manage varied and competing demands to agreed standards and timelines. ·

High level of interpersonal skills ·

International mindset and ability to work in multi-cultural environment. ·

Advance English level. Main role responsibilities: He/she will be the responsible to manage/grant the IT security of the LATAM region. The information security leader must have a strong background in information technology with a clear understanding of the challenges of information security. He/ she require excellent analytical and problem-solving abilities to identify and fix security risks. To build understanding and awareness of security issues throughout the organization, he/ she must have excellent communication and presentation skills. He/ she also need good team working skills to develop security solutions in collaboration with other information technology professionals. Roles and responsibilities: ·

Provide information security awareness training to organization personnel. ·

Creating and managing security strategies ·

Oversee information security audits, whether by performed by organization or third-party personnel. ·

Manage security security stacks like CrowdStrike NGAV and EDR, Akamai WAF, Mimecast AntiSpam, IBM Qradar, Cymulate Breach and Attack Simulation with hands on VAPT experience and all other information security personnel. ·

Provide training to information security personnel during onboarding. ·

Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement with the help of tools (External Attack Surface Monitoring) and external help. ·

Implement and oversee technological upgrades, improvements, and major changes to the information security environment. ·

Serve as a focal point of contact for the information security team and the third parties/vendors. ·

Excellent communication skills having command in English and local language (as required) ·

A strong understanding of the business impact of security tools, technologies, and policies ·

Manage and configure physical security, disaster recovery and data backup systems. ·

Communicate information security goals and new programs effectively with other department managers within the organization. ·

Experience with common information security management frameworks, such as International Standards Organization (ISO) 27001, National Institute of Standards and Technology (NIST), ISO 22301 and data privacy regulations (as applicable) ·

Experience in developing, reviewing and maintaining policies, procedures, standards and guidelines. Strong leadership abilities, with the capability to develop and guide information security team members and IT operations personnel, and work with minimal supervision. Experience in reviewing and validating the clauses as well terms and conditions with respect to data privacy in the non-disclosure agreements and contracts. ·

Ensure security for corporate applications in the face of new requirements and propose setup changes when necessary. ·

Update the systems documentation in terms of security decomposition diagrams and other tools to support the logical secure design of applications. ·

Define company's databases security standards, updating procedures and their use. Verify their security and integrity and keep their catalogs up to date. ·

Manage security and privacy, both of the computer installation. As of the access to the applications and data of the corporation. ·

Define servers and communications network operational at the highest level of security. ·

Act as official spokesperson representing the company in Computer security matters, to obtain agreements with state, business and institutions related to computer science based on guidelines previously drawn up by the management.

Preferred Certification:

·

Certificates like CISSP, CISA, CISM, ISO 27001 Lead Auditor / Lead Implementor will be preferred. Preferred Skillset: ·

CrowdStrike NGAV and EDR, Akamai WAF and Bot Management, Mimecast AntiSpam, IBM Qradar, Cymulate Breach and Attack Simulation, Upguard, Netskope, PAM tool with hands on VAPT experience.


Job tags



Salary

All rights reserved